A) zombie
B) rootkit
C) bot
D) Trojan horse
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) community property
B) intellectual property
C) creative
D) ethical
Correct Answer
verified
Multiple Choice
A) license software for individual use
B) outline computer activities for which the computer and network may or may not be used
C) contract with an outside organization to provide security and recovery services for a network
D) establish a network of computers, such as a homegroup
Correct Answer
verified
Multiple Choice
A) Electronic Communications Privacy Act (ECPA)
B) Fair Credit Reporting Act
C) Computer Fraud and Abuse Act
D) Computer Matching and Privacy Protection Act
Correct Answer
verified
Multiple Choice
A) PIN
B) password
C) secure key
D) passterm
Correct Answer
verified
Multiple Choice
A) An unsuspecting computer is used to send an influx of confusing data messages or useless network traffic.
B) Antivirus software disables a virus and protects the computer or network from unauthorized access.
C) The police use a virus and other measures to take down a network of computer criminals.
D) A zombie army is used to attack computers or computer networks.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) information theft
B) corruption
C) fraud
D) compaction
Correct Answer
verified
Multiple Choice
A) content filtering
B) web bugs
C) honeypots
D) spyware
Correct Answer
verified
Multiple Choice
A) cybersleuthing
B) digital forensics
C) system analysis
D) data mining
Correct Answer
verified
Multiple Choice
A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright
Correct Answer
verified
Multiple Choice
A) the money a criminal receives from extortion or other computer crimes
B) the amount of data loss to a company or individual who is a victim of a computer crime
C) the destructive event or prank the program is intended to deliver
D) the financial burden computer crime places on its victims
Correct Answer
verified
Multiple Choice
A) creating consumer and personal profiles by tracking website history and electronic purchases
B) compiling data from multiple computer users in order to make predictions about computer trends
C) filtering Internet content to targeted users based on their personal preferences
D) gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) software deployment
B) software decryption
C) app installation
D) product activation
Correct Answer
verified
Multiple Choice
A) digital signature
B) digital certificate
C) CA
D) digital security risk
E) firewall
F) botnet
G) zombie
H) clickjacking
I) Digital Millennium Copyright Act (DCMA)
J) DoS attack
K) AUP
L) iris recognition system
M) web filtering software
N) password
O) script kiddie
P) ciphertext
Q) plaintext
R) bot
S) piracy
T) copyright
Correct Answer
verified
Showing 101 - 120 of 197
Related Exams